{"title":"云计算中入侵检测的无监督离群点检测技术","authors":"M. Kumar, R. Mathur","doi":"10.1109/I2CT.2014.7092027","DOIUrl":null,"url":null,"abstract":"Outlier detection is becoming a recent area of research focus in data mining. Here we are proposing an efficient outlier detection concept DenOD (Density Based Outlier Detection) based on unsupervised method for intrusion detection in cloud computing environment. Unsupervised outlier detection techniques are playing big role in a various application domains such as network intrusion detection, fault detection and fraud detection. The beauty of unsupervised method is that, it does not require any training data set or any kind of previous knowledge. This technique can help to detect accurate and novel attacks without any previous knowledge. DenOD will implement on IDCC (Intrusion Detection in Cloud Computing) framework that has three components- Cloud nodes, IDS (Intrusion Detection System) and End User. This technique is capable to detect all kind of attacks as well as detect faulty services in cloud environment.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"16","resultStr":"{\"title\":\"Unsupervised outlier detection technique for intrusion detection in cloud computing\",\"authors\":\"M. Kumar, R. Mathur\",\"doi\":\"10.1109/I2CT.2014.7092027\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Outlier detection is becoming a recent area of research focus in data mining. Here we are proposing an efficient outlier detection concept DenOD (Density Based Outlier Detection) based on unsupervised method for intrusion detection in cloud computing environment. Unsupervised outlier detection techniques are playing big role in a various application domains such as network intrusion detection, fault detection and fraud detection. The beauty of unsupervised method is that, it does not require any training data set or any kind of previous knowledge. This technique can help to detect accurate and novel attacks without any previous knowledge. DenOD will implement on IDCC (Intrusion Detection in Cloud Computing) framework that has three components- Cloud nodes, IDS (Intrusion Detection System) and End User. This technique is capable to detect all kind of attacks as well as detect faulty services in cloud environment.\",\"PeriodicalId\":384966,\"journal\":{\"name\":\"International Conference for Convergence for Technology-2014\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-04-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"16\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference for Convergence for Technology-2014\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I2CT.2014.7092027\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference for Convergence for Technology-2014","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2CT.2014.7092027","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unsupervised outlier detection technique for intrusion detection in cloud computing
Outlier detection is becoming a recent area of research focus in data mining. Here we are proposing an efficient outlier detection concept DenOD (Density Based Outlier Detection) based on unsupervised method for intrusion detection in cloud computing environment. Unsupervised outlier detection techniques are playing big role in a various application domains such as network intrusion detection, fault detection and fraud detection. The beauty of unsupervised method is that, it does not require any training data set or any kind of previous knowledge. This technique can help to detect accurate and novel attacks without any previous knowledge. DenOD will implement on IDCC (Intrusion Detection in Cloud Computing) framework that has three components- Cloud nodes, IDS (Intrusion Detection System) and End User. This technique is capable to detect all kind of attacks as well as detect faulty services in cloud environment.